Conference Paper (937)

1141.
Conference Paper
Haeberlen, A.; Aditya, P.; Rodrigues, R.; Druschel, P.: Accountable virtual machines. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’10), pp. 1 - 16. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010), Vancouver, Canada, October 04, 2010 - October 06, 2010. USENIX Association, Berkeley, CA (2010)
1142.
Conference Paper
Jose, M.; Hu, Y.; Majumdar, R.: On power and fault-tolerance optimization in FPGA physical synthesis. In: 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 224 - 229. 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, November 07, 2010 - November 11, 2010. IEEE, Piscataway, NJ (2010)
1143.
Conference Paper
Kate, A.; Zaverucha, G. M.; Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, pp. 177 - 194 (Ed. Abe, M.). 16th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2010), Singapore, December 05, 2010 - December 09, 2010. Springer, Berlin (2010)
1144.
Conference Paper
Köpf, B.; Rybalchenko, A.: Approximation and randomization for quantitative information-flow analysis. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, pp. 3 - 14. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, July 17, 2010 - July 19, 2010. IEEE, Piscataway, NJ (2010)
1145.
Conference Paper
Köpf, B.; Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, pp. 44 - 56. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, July 17, 2010 - July 19, 2010. IEEE, Piscataway, NJ (2010)
1146.
Conference Paper
Majumdar, R.; Saha, I.; Wang, Z.: Systematic testing for control applications. In: 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE), pp. 1 - 10. 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE), Grenoble, July 26, 2010 - July 28, 2010. IEEE, Piscataway, NJ (2010)
1147.
Conference Paper
Mislove, A.; Viswanath, B.; Gummadi, K. P.; Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search & Data Mining (WSDM), pp. 251 - 260. Third ACM International Conference on Web Search & Data Mining (WSDM 2010), New York, NY, February 03, 2010 - February 06, 2010. ACM, New York, NY (2010)
1148.
Conference Paper
Rossberg, A.; Russo, C. V.; Dreyer, D.: F-ing modules. In: TLDI’10: proceedings of the 2010 ACM SIGPLAN Workshop on Types in Language Design and Implementation, pp. 89 - 102. 2010 ACM SIGPLAN Workshop on Types in Language Design and Implementation (TLDI 2010), Madrid, January 23, 2010. ACM, New York, NY (2010)
1149.
Conference Paper
Viswanath, B.; Post, A.; Gummadi, K. P.; Mislove, A.: An analysis of social network-based Sybil defenses. In: SIGCOMM’10: proceedings of the SIGCOMM 2010 Conference, pp. 363 - 374. SIGCOMM 2010 Conference, New Delhi, August 30, 2010 - September 03, 2010. ACM, New York, NY (2010)
1150.
Conference Paper
Wieder, A.; Bhatotia, P.; Post, A.; Rodrigues, R.: Conductor: orchestrating the clouds. In: Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2010), pp. 44 - 48. 4th International Workshop on Large Scale Distributed Systems and Middleware (LADIS 2010), Zürich, July 28, 2010 - July 29, 2010. ACM, New York, NY (2010)
1151.
Conference Paper
Wieder, A.; Bhatotia, P.; Post, A.; Rodrigues, R.: Brief announcement: Modelling MapReduce for optimal execution in the cloud. In: PODC’10: proceedings of the 2010 ACM Symposium on Principles of Distributed Computing, pp. 408 - 409. 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2010), Zürich, July 25, 2010 - July 28, 2010. ACM, New York, NY (2010)
1152.
Conference Paper
Ahmed, A.; Dreyer, D.; Rossberg, A.: State-dependent representation independence. In: POPL’09 Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 340 - 353. 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Savannah, Georgia, January 21, 2009 - January 23, 2009. ACM, New York, NY (2009)
1153.
Conference Paper
Antunas, G.; Barateiro, J.; Cabral, M.; Borbinha, J.; Rodrigues, R.: Preserving digital data in heterogeneous environments. In: JCDL’09: proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries, pp. 345 - 348. 2009 ACM/IEEE Joint Conference on Digital Libraries (JCDL'09), Austin, Texas, June 15, 2009 - June 19, 2009. ACM, New York, NY (2009)
1154.
Conference Paper
Backes, M.; Chen, T.; Dürmuth, M.; Lensch, H. P. A.; Welk, M.: Tempest in a teapot: compromising reflections revisited. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 315 - 327. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1155.
Conference Paper
Backes, M.; Druschel, P.; Haeberlen, A.; Unruh, D.: CSAR: A Practical and Probable Technique to Make Randomized Systems Accountable. In: 2009 Network and Distributed System Security Symposium, pp. 341 - 353. 16th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 08, 2009 - February 11, 2009. Internet Society, Reston, VA (2009)
1156.
Conference Paper
Backes, M.; Grochulla, M. P.; Hritcu, C.; Maffei, M.: Achieving security despite compromise using zero-knowledge. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, pp. 308 - 323. 22nd IEEE Computer Security Foundations Symposium, Port Jefferson, NY, July 08, 2009 - July 10, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1157.
Conference Paper
Backes, M.; Hamerlik, M.; Linari, A.; Maffei, M.; Tryfonopoulos, C.; Weikum, G.: Anonymity and censorship resistance in unstructured overlay networks. In: On the Move to Meaningful Internet Systems: OTM 2009: proceedings. - Part I, pp. 147 - 164 (Eds. Meersman, R.; Dillon, T.; Herrero, P.). Confederated International Conferences CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, November 01, 2009 - November 06, 2009. Springer, Berlin (2009)
1158.
Conference Paper
Backes, M.; Hofheinz, D.; Unruh, D.: CoSP: a general framework for computational soundness proofs. In: CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 66 - 78. 16th ACM Conference on Computer and Communications Security, Chicago, Ill., November 09, 2009 - November 13, 2009. ACM, New York, NY (2009)
1159.
Conference Paper
Backes, M.; Köpf, B.; Rybalchenko, A.: Automatic discovery and quantification of information leaks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 141 - 153. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1160.
Conference Paper
Benevenuto, F.; Rodrigues, T.; Cha, M.; Almeida, V.: Characterizing user behavior in online social networks. In: IMC’09 Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference, pp. 49 - 62. 2009 ACM SIGCOMM Internet Measurement Conference, Chicago, Ill., November 04, 2009 - November 06, 2009. ACM, New York, NY (2009)
Go to Editor View